1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
3 years ago
13

There are varying definitions for the term "dumb terminal," but it often refers to the fact that the terminal has

Computers and Technology
1 answer:
olga_2 [115]3 years ago
8 0

Answer:

Specific Known Limitations

Explanation:

Terminal is the point, where data comes from parts of computers or transmit to the other parts of computer.

<u><em>Examples</em></u>

Keyboard, monitor, printer, memory and CPU are examples of terminals.

There are two types of terminals.

<u>Dumb Terminals</u>

The terminals where data has arrived or transmit from but cannot be processed are called dumb terminals. These processors don't have processing powers.

e.g Keyboard and Monitor

<u>Intelligent Terminal</u>

The terminal who have ability to modify or process data are called intelligent terminals.

e.g CPU

<em>As Dumb terminals have no processing powers, we can say that, the terminal has </em><u><em>Specific Known Limitations.</em></u>

<em></em>

You might be interested in
Which automated method for VPN connection deployment would work best in combination with Microsoft Intune or Microsoft Endpoint
maks197457 [2]

There are different kinds of automated method for VPN connection deployment. The automated method for VPN connection deployment would work best  is ProfileXML

  • ProfileXML is known to be often used as a delivery methods in Windows PowerShell, Microsoft Endpoint Configuration Manager, and Intune. For an individual to be able to use the ProfileXML VPNv2 CSP setting, one have to construct XML by using the ProfileXML schema.

An individual can configure the Always On VPN client by using the PowerShell, Microsoft Endpoint Configuration Manager, or Intune. They all need an XML VPN profile to configure the appropriate VPN settings.

Learn more from

brainly.com/question/25554117

3 0
2 years ago
Explain how the CPU processes data instructions.
Black_prince [1.1K]

Answer:

The actual mathematical operation for each instruction is performed by a combinational logic circuit within the CPU's processor known as the arithmetic logic unit or ALU.

Explanation:

6 0
2 years ago
If you wanted to detect x-rays coming from the sun,where would you place the detector? Why?
Temka [501]
You would place it in orbit around Earth, as most X-rays are absorbed by the atmosphere, so you would want the detector outside of the atmosphere to accurately detect the X-rays.
5 0
3 years ago
what is one example of the decomposers taking from the ecosystem and one of them giving to the ecosystem
adelina 88 [10]
Like when a seed drops on the ground, and a bee come to take some honey. It sticks to the bee and where the bee goes, the bee will rub it off and the seed will start to grow.
8 0
2 years ago
Research and describe a recent development in theater and film lighting and explain how the technology can be used. (Maybe limit
Hunter-Best [27]

Answer:

A computerized light dimmer is one helpful development in lighting equipment. Computerized light dimmers help to control the brightness of light. These dimmers lower or increase the intensity of light. I first noticed light dimmers in a scene from the movie Children of Men. In a war scene, innocent people are shown running helter-skelter to save their lives. Artificial lights are used in scene to create that dark appearance in broad daylight, which makes the scene look gloomy and scary. It helped to generate the feeling of uncertainty and suspense through the proper use of lights. Light dimmers help light designers to create the exact atmosphere that the director demands for a scene. Also, because of dimmers, a light designer need not use extra accessories to diffuse light or make the scene brighter.

Explanation:

This is Plato's sample answer so take pieces out.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is one concern associated with web-based applications?
    12·1 answer
  • Can someone please help me with this question??
    12·1 answer
  • When did gaming become a thing?
    7·2 answers
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • Why does a thermostat blade bend when heated or cooled?
    9·1 answer
  • A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparatio
    13·1 answer
  • (Comparable interface) Write Rectangle class that implements the Comparable interface. Override the equals method so that two Re
    12·1 answer
  • Create a set of functions that compute the mean, median, and mode of a set of
    8·2 answers
  • Why do you want to work from our company?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!